Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 05:04

General

  • Target

    9a2d548d1d927a1661869894b8f3f995d2dc9712e5a73fd3a23c7a355a45e83eN.exe

  • Size

    38KB

  • MD5

    e46b1f3ebc677975e1ab38bd4129f2f0

  • SHA1

    000d1cbcb0604b519f811c4512dea6b28286e3db

  • SHA256

    9a2d548d1d927a1661869894b8f3f995d2dc9712e5a73fd3a23c7a355a45e83e

  • SHA512

    47208d4ebf1bd25d789d398b90dcea447b156ca26555a3c20b84ba09d8ddc29f9b8aba7319b8f4a2429128358f45dfaf617a862ff8c42674f245d96357b843a7

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1f:W7ZppApBULcfpHLcfpSo3fR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a2d548d1d927a1661869894b8f3f995d2dc9712e5a73fd3a23c7a355a45e83eN.exe
    "C:\Users\Admin\AppData\Local\Temp\9a2d548d1d927a1661869894b8f3f995d2dc9712e5a73fd3a23c7a355a45e83eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    b34d57d8eb6bbc34b3f8eebbd79f1f90

    SHA1

    1feedb6cbcd9510e6998c0faff1a613251ccd569

    SHA256

    dba7010ce3a799adf59c46e5148aa12c55535310e86c46c5d142c08e0fbb38a7

    SHA512

    f61f880bad7d23835d21b310de575336c728f838c935b4ffe00c7ccc56dcd56cfdc10483dfd2849e86d75df5ad1b38a9d914269b61981431af29b4572e5c8c84

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    a74298c2ad6570a21fdb1fcd3f05ba2e

    SHA1

    5bf19ff9c8d310a1ec7e32b91e419662567b8936

    SHA256

    d936a370b643d3a09f36d83517a42b06cbd3b9fd64ea54560070a1bc59441a6d

    SHA512

    fcefca830a6c81735fe5d6cccebd68466f1d128f06d718c9006966f1a79ce1d6897b434d38a041e9340519bc426828b5ad8c1ca0cc25f9a282dbe52919c48ae1